期刊文献+

一种适用于军事物联网的密钥管理方案 被引量:1

A Key Management Scheme Applicable to Military Internet of Things
下载PDF
导出
摘要 北斗卫星导航系统终端提供的特定节点身份标识,将Shamir(t-n)门限秘密共享方案同轻量级CA密钥管理方案相结合,提出一种适用于军事物联网的新的非对称密钥管理方案.该方案采用分布式轻量级CA公钥认证框架,不需要密钥管理中心的支撑,实现了认证的本地化,更好的解决了认证复杂化问题,有效的避免了认证的单点失败.通过分析表明,该方案有较好的安全性和较高的效率. By using the BeiDou navigation Satellite System' s RDSS business and integrating Shamir (t=n) threshold secret sharing scheme with key management scheme of Lite CA, this paper proposes a new asymmetric key management scheme method for the Internet of Things. The scheme uses a distributed Lite CA public key authentication framework, which does not require key management center for supporting. It can achieve the localization of the certification, solve the problem of the complexity of the certification, and effectively avoid the single point of failure of the certification. The analysis shows that the proposed scheme has better security and higher efficiency.
出处 《军械工程学院学报》 2017年第3期30-33,共4页 Journal of Ordnance Engineering College
关键词 军事物联网 密钥管理 轻量级CA 门限秘密共享方案 military Internet of things key management Lite Certificate Authority thresholdsecret sharing scheme
  • 相关文献

参考文献4

二级参考文献66

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 3宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 4http://www.epcglobalinc.org/. 被引量:3
  • 5HAMAD F,SMALOV L,JAMES A.Energy-aware security in M-commerce and the Internet of Things[J].IETE,Technical review,2009,26(5):357-362. 被引量:1
  • 6WATRO R,KONG D,et al.TinyPK:Securing sensor networks with public key technology[C]∥ Proc of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM press,2004:59-64. 被引量:1
  • 7BENENSON Z,GEDICKE N,RAIVIO O.Realizing robust user authentication in sensor networks[C]∥Proc of the Workshop on Real-World Wireless Sensor Networks(REALWSN 2005).[S.l.]:Stockholm,2005.135-142. 被引量:1
  • 8MALAN D J,WELSH M,SMITH M D.A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C]∥ 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks.Piscataway:IEEE,2004:71-80. 被引量:1
  • 9OUADJAOUT A,CHALLAL Y,LASLA N,et al.SEIF:Secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks[C]∥Proc of the Third International Conference on Availability,Reliability and Security(ARES 2008).Piscataway:IEEE,2008:503-508. 被引量:1
  • 10MA R,XING L D,MICHEL H E.A new mechanism for achieving secure and reliable data transmission in wireless sensor networks[C]∥Proc of the 2007 IEEE Conference on Technologies for Homeland Security:Enhancing Critical Infrastructure Dependability.Piscataway:IEEE,2007:274-279. 被引量:1

共引文献145

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部